News

2019-08-20

Home Working Can Often Be A Security Threat

The security lapses employees may make when working from remote locations represent one of the largest cybersecurity threats to business.

2019-08-20

Connected Cars Are The New Attack Vector

Hacking some smart devices might lead to nothing more than an invasion of privacy. Hacks of connected cars could be used for lethal purposes.

2019-08-20

Foreign Cyber Intrusions On The USA

It’s not just happening on Election Day. Foreign governments are using social media to insert themselves into US politics “every single day'.

2019-08-19

Cyber Security: A Guide For Education Providers

Firewalls, data back-ups, staff training and email verification are just some of the actions colleges should take to protect themselves against attacks.

2019-08-19

Transforming A Business The Data Driven Way

Reading List: A manual for newly-appointed data leaders in companies that are planning to start on a journey of data transformation.

2019-08-19

The Global Cyber Skills & Training Shortage

Skilled cybersecurity professionals are key, but there are just not enough of them and there is an anticipated shortage of 1.8m workers by 2022.

2019-08-19

US Releases Malware Linked To N. Korean Hacking Group

Electric Fish: US Cyber Command has released samples of malware that they say are linked to N. Korean hackers from the Lazarus Group.

2019-08-16

Attacks On Financial Services Just Keep Going Up

The financial services industry is complacent about cyber security and must rapidly adapt its procedures if it wants to keep its customers trust.

2019-08-16

Airlines Think Biometrics Will Improve Passengers' Experience

Star Alliance are working on a biometric data-based identification platform for frequent flyer program customers of member airlines.

2019-08-16

United Nations Investigating N Korean Cyber Attacks

S. Korea was hard hit by ten attacks by N. Korean hackers. India had three, Bangladesh and Chile were hit by three attacks plus 13 more countries.

2019-08-14

Webinar: How to Build a Threat Detection Strategy in AWS

22nd August: Join SANS and AWS Marketplace to gain insights into creating a threat detection strategy for your cloud workloads.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.